Reuters reports an intrusion into an Israeli Defense Ministry network. The vector was an attachment to an email that spoofed a Shin Bet sender.
The Syrian Electronic Army's (SEA) exploit against CNN last week was accomplished through phishing (described as an "intense, sophisticated attack"). The SEA has also claimed responsibility for a recent attack on Microsoft, which the software company reported this weekend might have compromised information related to "law enforcement inquiries."
Unrest in Ukraine has been accompanied by information operations (apparently regime-directed) against protesters and dissidents. (And compare CrowdStrike's trend forecast, which predicts that cyber attacks in 2014 will be increasingly linked to political conflict.)
US Federal Courts experienced a brief outage Friday. Despite claims to the contrary from Tweeters calling themselves "the European Cyber Army, " what was initially thought to be a denial-of-service attack appears instead to have been a software glitch.
Friday's Gmail travails are also ascribed to error.
Craft-supply retailer Michaels is the latest US merchant to disclose a credit card breach.
Two relatively new threats engage vulnerability researchers: acoustic methods of bridging air gaps and the prospect of weaponized virtual currencies.
In industry news, VMWare's acquisition of AirWatch is seen as an enterprise mobility management play. Google buys British artificial intelligence company DeepMind for $500M. Lockheed Martin and EMC expand operations in Israel; Prime Minister Netanyahu thinks the economic benefit of opening the country's cyber market outweigh the potential security risks.
In the US, surveillance policy takes curious partisan detours. Snowden alleges US economic espionage.